Are you struggling for the 300-320 exam? Good news, Lead2pass Cisco technical experts have collected all the questions and answers which are updated to cover the knowledge points and enhance candidates’ abilities. We offer the latest 300-320 PDF and VCE dumps with new version VCE player for free download, and the new 300-320 dump ensures your 300-320 exam 100% pass.

QUESTION 26CoS is applied for Layer 2 markings in an Ethernet environment. Which protocol must be configured on the Layer 2 switch port for CoS to work?

A. MPLSB. IEEE 802.1WC. IEEE 802.1QD. IEEE 802.1S

Answer: C

QUESTION 27Which protocol is used in an in-band network and why?

A. UDP, because it is connectionlessB. SSH, because the username and password are encryptedC. Telnet, because the username and password are sent in clearD. MSDP, because it uses TCP as its transport protocol

Answer: B

QUESTION 28What is an advantage of having an out-of-band management?

A. It is less expensive to have an out-of-band management.B. Network devices can still be managed, even in case of network outage.C. There is no separation between the production network and the management network.D. SSH protocol must be used to manage network devices.

Answer: B

QUESTION 29The direction of the flow of multicast traffic is based on which protocol?

A. PIMB. IGMPC. underlying IGPD. MSDP

Answer: CExplanation:https://www.cisco.com/c/en/us/td/docs/ios/solutions_docs/ip_multicast/White_papers/mcst_ovr.html“Reverse Path Forwarding (RPF) PIM uses the unicast routing information to create a distribution tree along the reverse path from the receivers towards the source. The multicast routers then forward packets along the distribution tree from the source to the receivers. RPF is a key concept in multicast forwarding. It enables routers to correctly forward multicast traffic down the distribution tree. RPF makes use of the existing unicast routing table to determine the upstream and downstream neighbors. A router will forward a multicast packet only if it is received on the upstream interface. This RPF check helps to guarantee that the distribution tree will be loopfree.”

QUESTION 30Which option can be implemented to manipulate the election of PIM DR to force multicast traffic to a certain path?

QUESTION 33An HSRP design requirement states that preemption must be enabled for the active switch, which is a Cisco 4507R. Assume a boot time of 300 seconds. Which setting of the preemption delay timer minimizes the loss of traffic?

A. 50 secondsB. 100 secondsC. 150 secondsD. 200 seconds

Answer: DExplanation:https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Campus/HA_campus_DG/ hacampusdg.html#wp1107923The recommended best practice is to measure the system boot time, and set the HSRP preempt delaystatement to 50 percent greater than this value. This ensures that the HSRP primary distribution node hasestablished full connectivity to all parts of the network before HSRP preemption is allowed to occur”-> We can’t choose 450 secondes so we take the higher delay available..

QUESTION 34What is the next action taken by the Cisco NAC Appliance after it identifies a vulnerability on a client device?

Answer: AExplanation:https://www.cisco.com/c/en/us/td/docs/security/nac/appliance/configuration_guide/47/cam/47cam-book/m_intro.html“Cisco NAC Appliance compliance policies reduce the threat of computer viruses, worms, and other malicious code on your network. Cisco NAC Appliance is a powerful tool that enables you to enforce network access requirements, detect security threats and vulnerabilities on clients, and distribute patches, antivirus and antispyware software. It lets you block access or quarantine users who do not comply with your security requirements, thereby stopping viruses and worms at the edge of the network, before they can do harm.”

QUESTION 35Refer to the exhibit. A customer requires a web application implementation, but the web server has communication only to the application server and users, and the database server has communication only to the application server. What firewall design is the best fit for this scenario?

A. transparent mode with the servers on the same subnetB. routed mode with three security zonesC. transparent mode with three security zonesD. routed mode with two security zones

Answer: B

QUESTION 36Which route summarization most efficiently reduces perceived network complexity that is composed of subnetworks ranging from 172.16.20.0/24 to 172.16.36.0/24?

QUESTION 45A Layer 2 switch in the network has recently started broadcasting traffic out of every port and is impacting network performance. The engineering department determines that a MAC overflow attack is the cause. Which two features can protect and mitigate the damage of the attacks? (Choose two.)

QUESTION 46Refer to the exhibit. Based on the configuration, why are routers R1 and R2 not exchanging OSPF routes?

A. The OSPF process numbers are different.B. There is no backbone area configured.C. The router IDs are different.D. OSPF is not enabled on the interfaces.

Answer: B

QUESTION 47An engineer notices that many BGP peers utilize the same configuration parameters. What can the engineer configure to simplify BGP neighbor statements and generate more efficient BGP peer updates?

QUESTION 48What is the correct state between two BGP peers that are neighbors?

A. activeB. operationalC. establishedD. up

Answer: C

QUESTION 49Refer to the exhibit. A network engineer manually reconfigures the BGP configuration on newly upgraded router R1. However, the BGP neighbor relationship does not come up with the directly connected neighbor router. What is causing the failure of the BGP neighbor relationship between routers R1 and R2?

A. An incorrect neighbor IP address for router R2 is configured on router R1.B. An incorrect neighbor AS number is configured on router R1 for router R2.C. The wrong BGP authentication password is configured on router R1.D. Router R1 must configure the R2 loopback address as the neighbor IP address.

Answer: C

QUESTION 50Which option is a primary requirement for the deployment of an IPv6-enabled network via the native method (dual-stack model) within the enterprise campus environment?

A. hardware-based switching support for IPv6 forwarding on all campus switchesB. restriction of IPv6-enabled devices to the core layerC. manual implementation of tunneling between IPv6-incompatible devices in an IPv4-over-IPv6 tunnelD. disabling of multicast in the distribution layer prior to implementation of IPv6

Answer: A

We ensure our new version 300-320 PDF and VCE dumps are 100% valid for passing exam, because Lead2pass is the top IT certification study training materials vendor. Many candidates have passed exam with the help of Lead2pass’s VCE or PDF dumps. Lead2pass will update the study materials timely to make them be consistent with the current exam. Download the free demo on Lead2pass, you can pass the exam easily.